Manage

Easily handle and automate your day to day tasks uniformly and transparently across a polyglot database infrastructure. Automate backups, health checks, database repair/recovery, security and upgrades using battle tested best practices.

Manage

Security

Get your data protected with encryption in transit between your client, cluster and all replicated traffic. Use a defensible encryption key management strategy to meet compliance regulations like PCI DSS and HIPAA.

This will depend on the hardware that ClusterControl runs on. A small VM with 2 CPU cores, 2 GB RAM and 30GB hard disk can easily manage dozens of instances.

Can we limit what actions a ClusterControl user can perform?

ClusterControl uses Role-Based Access Control to restrict access to databases, and their respective deployment, management and monitoring features. This ensures that only authorised user requests are allowed. ClusterControl uses a permissions framework to define how a user may interact with the management and monitoring functionality, after they have been authorised to do so.

Is there an API to interact with the management functions?

Yes, you can access all functionality through a REST API. The web UI uses the same API to interface with ClusterControl.